Breaking News: Cybersecurity

Filters close
Released: 9-Jul-2014 9:30 AM EDT
Madison-Based SWAMP, Secure Decisions Partner to Enhance Software Security
University of Wisconsin–Madison

Secure Decisions, a leading provider of assessment tools to enhance software security, is partnering with the Software Assurance Marketplace (SWAMP) to build a powerful and publicly accessible resource to improve the software that drives everyday life.

Released: 2-Jul-2014 9:00 AM EDT
Georgia Tech Researchers Develop ‘Encore’ to Monitor Web Access
Georgia Institute of Technology

Georgia Tech researchers have created a tool to monitor the accessibility of Web pages around the world that can be installed by adding a single line of code to a web page. The tool, Encore, runs when a user visits a website where the code is installed and then discreetly collects data from potentially censored sites.

Released: 19-Jun-2014 2:25 PM EDT
Georgia Tech Research Identifies Android Security Weaknesses Caused by Performance Design
Georgia Institute of Technology

Georgia Tech researchers have identified a weakness in one of Android’s security features. The research, titled Abusing Performance Optimization Weaknesses to Bypass ASLR, identifies an Android performance feature that weakens a software protection called Address Space Layout Randomization (ASLR), leaving software components vulnerable to attacks that bypass the protection.

Released: 19-Jun-2014 9:05 AM EDT
Cybersecurity Center Earns DHS, NSA Designation
Kansas State University

Kansas State University's cybersecurity center is receiving national recognition for its dedication to software security and cyber defense.

Released: 18-Jun-2014 4:00 PM EDT
Columbia Engineering Team Finds Thousands of Secret Keys in Android Apps
Columbia University School of Engineering and Applied Science

Columbia Engineering researchers have discovered a crucial security problem in Google Play, the official Android app store. The study is the first to make a large-scale measurement of the huge marketplace, using PlayDrone, a tool they developed to circumvent Google security to successfully download Google Play apps and recover their sources.

10-Jun-2014 12:00 PM EDT
Guarding Against “Carmageddon” Cyberattacks
Vanderbilt University

The tightly integrated computing and networking systems required to turn the nation’s freeways in “smart transportation systems” are currently under development. The efforts of the Smart Roads Cyber-Physical Systems project to identify cyber attacks against these systems and to develop software to protect them is dramatized by the video scenario “Mitigating Carmageddon” featured at the SmartAmerica Expo in Washington DC.

Released: 4-Jun-2014 3:00 PM EDT
Passwords No More? UAB Researchers Develop Mechanisms That Enable Users to Log in Securely Without Passwords
University of Alabama at Birmingham

An innovative solution for safeguarding personal information relies on your proximity instead of your memory.

27-May-2014 9:05 AM EDT
New Proactive Approach Unveiled to Detect Malicious Software in Networked Computers and Data
Virginia Tech

Computer scientists at Virginia Tech have developed a unique anomaly protection security approach for the detection of malicious activities on networked computers. The work was performed using a National Science Foundation CAREER award and is being presented at an international conference in Tokyo, Japan.

Released: 28-May-2014 4:00 PM EDT
Lowly Control Systems Vulnerable to Hacks, According to UAH Expert
University of Alabama Huntsville

Industrial systems that control heating and cooling, water treatment plants, etc. are a low priority. That’s why they are so vulnerable to hackers, says Dr. Ray Vaughn, vice president for research at The University of Alabama in Huntsville.

Released: 18-Apr-2014 11:00 AM EDT
The Upshot of 'Heartbleed'? Jobs
University of Arkansas at Little Rock

The Internet bug "Heartbleed" was a stark reminder of how vulnerable our information is on the web, but also a sign that future job growth is rooted in securing that information. Higher education plays a significant role in helping fill these jobs.

Released: 15-Apr-2014 11:00 AM EDT
Flaw in ‘Secure’ Cloud Storage Could Put Privacy at Risk
 Johns Hopkins University

Johns Hopkins computer scientists have found a flaw in the way that secure cloud storage companies protect their customers’ data.

Released: 14-Apr-2014 2:00 PM EDT
UT Dallas Cybersecurity Researchers Roll Out a New Heartbleed Solution
University of Texas at Dallas

As companies scrambled in recent days to address the latest cybersecurity bug known as Heartbleed, researchers at The University of Texas at Dallas had a solution that fixes the vulnerability, and also detects and entraps hackers who might be using it to steal sensitive data

Released: 11-Apr-2014 5:00 PM EDT
MSU Information Systems Expert Advises on Creating Strong Passwords
Mississippi State University

The recently-discovered “Heartbleed” bug affecting as much as two-thirds of the Internet is causing people to hurriedly change passwords and further secure online personal information. Merrill Warkentin of Mississippi State University said Friday [April 11] that choosing strong passwords is among the best proactive steps for minimizing vulnerability to identity theft.

Released: 7-Apr-2014 11:00 AM EDT
Personal Touch Signature Makes Mobile Devices More Secure
Georgia Institute of Technology

Georgia Tech researchers have developed a new security system that continuously monitors how a user taps and swipes a mobile device. If the movements don’t match the owner’s tendencies, the system recognizes the differences and can be programmed to lock the device.

Released: 25-Mar-2014 12:00 PM EDT
NYIT Hosts First Global Cybersecurity Conference in Abu Dhabi
NYIT

NYIT held its first Global Cybersecurity Conference in Abu Dhabi today, which was inaugurated the U.A.E. Minister of Culture, Youth and Community Development. NYIT’s conference welcomed cyber defense professionals, information technologists, banking and finance executives, and others across these fields from the U.S., China, the United Arab Emirates and beyond. NYIT has a history of hosting cybersecurity events at its New York City campus. Today’s event was its first cybersecurity conference with a truly worldwide reach.

   
Released: 4-Mar-2014 10:00 AM EST
Iowa State Engineers Build Software Tools to Assure Security of Smartphones
Iowa State University

Iowa State's Suraj Kothari is leading researchers from Iowa State University and Ames, Iowa-based EnSoft Corp. who are developing ways to secure smartphone software for the Defense Department.

Released: 28-Feb-2014 10:00 AM EST
Brain Research Tracks Internet Safety Performance, Dispels Assumptions, Identifies Traits of Those at-Risk
University of Alabama at Birmingham

Researchers used a novel methodology to gain new neurological insights into how users face security questions and how their personalities might affect their performance.

Released: 28-Feb-2014 10:00 AM EST
UAB Research Improves Ease and Security of Password Protections
University of Alabama at Birmingham

The paper proposes and tests four two-factor schemes that require servers to store a randomized hash of the passwords and a second device, such as the user’s security token or smartphone, to store a corresponding secret code.

Released: 25-Feb-2014 1:00 PM EST
Georgia Tech Project Ensures 'What You See Is What You Send’
Georgia Institute of Technology

Researchers at Georgia Tech have created a prototype software, Gyrus, that takes extra steps to prevent malware from sending spam emails and instant messages, and blocking unauthorized commands such as money transfers.

Released: 18-Feb-2014 11:30 AM EST
Professor’s Book Details History of Cyber Crime and Provides Case Studies
Appalachian State University

Book provides a history of cyber crime and case studies related to individuals’ use of technology to commit a crime.

Released: 21-Jan-2014 11:00 AM EST
SDSC and Leidos to Help Develop New Cybersecurity Reference Architecture for Electrical Microgrids
University of California San Diego

The San Diego Supercomputer Center (SDSC) at the University of California, San Diego, is collaborating with Leidos (formerly Science Applications International Corporation) to develop a reference system architecture aimed at increasing security levels of microgrid control and IT systems used to manage electrical microgrids worldwide.

Released: 14-Jan-2014 9:15 AM EST
Department of Energy Awards Contract to Detect Cyber Attacks on Utilities
Georgia Institute of Technology

Today’s cyber attacks aren’t just a threat to computer networks. Those with malicious intent can disrupt important infrastructure systems such as utilities. To counter this threat, the Department of Energy has awarded $1.7 million to help detect cyber attacks on our nation’s utility companies.

Released: 27-Nov-2013 11:00 AM EST
Writing the Rules of Cyberwar
IEEE Spectrum Magazine

With full-fledged cyberwar becoming an increasingly likely possibility in the 21st century, one cybersecurity scholar calls on nations to extend the rules of war to cyberconflicts.

Released: 7-Nov-2013 5:00 PM EST
Creating Accountable Anonymity Online
Iowa State University

Researchers at Iowa State University are working to add some accountability to online anonymity. They've developed a technology that offers anonymity for honest users and accountability for dishonest users.

Released: 7-Nov-2013 10:00 AM EST
Cybersecurity Algorithms, Techniques Being Developed Through Anthropology Methods
Kansas State University

Experts in anthropology and cybersecurity are examining the unspoken knowledge shared by cybersecurity analysts as a way to develop new automated tools that help analysts strengthen their cyber defenses.

Released: 6-Nov-2013 2:00 PM EST
Georgia Tech Warns of Threats to Cloud Data Storage, Mobile Devices in Latest ‘Emerging Cyber Threats’ Report
Georgia Institute of Technology

As more businesses find their way into the cloud, few engage in security measures beyond those provided by the associated cloud storage firm, a new report from Georgia Tech notes. Even fewer seek heightened data protection because of concerns that usability and access to remote data would be significantly reduced.

Released: 31-Oct-2013 8:00 AM EDT
NSA Snooping? Surveillance-Free Cell Technology Within Reach
Cornell University

Stephen B. Wicker, electronic surveillance and privacy expert, professor of Electrical and Computer Engineering at Cornell University and author of “Cellular Convergence and the Death of Privacy,” discusses how technology, social trends and government policy have opened the floodgates for surveillance and eroded privacy worldwide.

Released: 24-Sep-2013 4:20 PM EDT
NSU’s Graduate School of Computer and Information Sciences Raises Awareness About Cyber Security
Nova Southeastern University

During the month of October, Nova Southeastern University’s Graduate School of Computer and Information Sciences (GSCIS) is hosting a series of events in observance of National Cyber Security Awareness Month.

Released: 13-Sep-2013 10:00 AM EDT
NYIT Cyber Security Conference 2013: Threats, Protections, Tools, and Education
NYIT

As the need to protect individuals and organizations against threats of cyber attacks continues to increase, New York Institute of Technology’s annual cyber security conference is bringing together experts from the security industry, government, and academia to foster dialogue and developments around increasingly complex challenges they face today.

Released: 10-Sep-2013 12:40 PM EDT
Threat to Privacy Found in Auto Insurance “Pay As You Drive” Programs
Dick Jones Communications

Auto insurance 'pay as you drive' programs can be used to correctly infer one's destination, researchers find.



close
1.53335